Privacy vs Anonymity
Guest written by Laurtis Vestergaard In the first post of our series on setting up VPNs we covered the basics of how to set up a VPN what equipment is needed. If you missed it you can read it here….
How to set up a VPN
Guest written by: Laurtis Vestergaard In these next series of blogs, we will walk you through the various methods on how you can set-up a commercial VPN or create your own for secure online browsing. Previously we have looked at…
What is a VPN?
What is a VPN? A VPN or virtual private network allows you to establish secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity on public Wi-Fi. VPN’s are very…
DDoS attack brings down Israeli government websites
At the beginning of March Israeli government websites suffered a cyberattack claiming to be originating in Iran, an attack believed to be a DDoS attack beginning in the evening with increased traffic to numerous servers running Gov.il websites. Attack bandwidth…
Famous Malware: Part four of the Hacker Series
Dear readers for part four of our hacker series will talk about some of world’s most famous malware. The tools are used by APTs to attack their victim and cause major damage Emotet 2018 Our first famous malware…
What is Log4j? The most serious security breach ever?
In December a new vulnerability was discovered inside log4j piece of java software used by most major software companies. Quoting a leading cybersecurity expert in that time “The log4j vulnerability is the most serious vulnerability I have seen…
ProtonMail shows faults in its unshakable privacy policy
last month the so-called privacy oriented ProtonMail webmail service quietly removed IP tracking from its list of privacy protections for which it has been praised for in the past. The company’s privacy policy, which was quietly updated now says that…
WhatsApp encryption: is it as secure as they say?
Facebook says it does not read WhatsApp messages WhatsApp messenger is an american freeware instant messaging services that is owned by Facebook and has become extremely popular worldwide due to its full ability to support voice calls video calls and…
Rubika accused of dirty tricks to beat instagram in Iranian market
Rubika aims to become more used within Iran The Iranian social media app named Rubika is accused of copying peoples Instagram accounts and placing the accounts on its own platform to boost the appearance of its popularity. Rubika is similar…
Ransomware and the increasing malware landscape in Iran
Recently we have seen an ever-increasing number of successful ransomware attacks carried out in cyberspace. While attacks often seem to be clustered in time followed by periods of little to no activity it would seem wea re now in a…










